General
-
Target
5838811fd00d3c4f04341c794a654bd1_JaffaCakes118
-
Size
602KB
-
Sample
240519-df5vxseh81
-
MD5
5838811fd00d3c4f04341c794a654bd1
-
SHA1
450cbc9ef3c96971e62f7ca0dc6bb9e6b37bbf44
-
SHA256
fdef0a60fdba36cece653755ef1dee044225cde6c988fc6b0a4efceba7c87114
-
SHA512
1e6739c498c81aa51510e4fd4367f6d8dda3befb65e9b8cb5068e1b0b738d7007f8dd42082f01d2369bb3a565d7508ccadc0348c3ac2479d08171fbc537823db
-
SSDEEP
12288:mEaFZvkGGNUuWW1NVwCKn6GAx1d9H1BY+0aTBpqSol2KpELpX79A:mEaFmFN9v46flH72wOSoMKU9A
Static task
static1
Behavioral task
behavioral1
Sample
5838811fd00d3c4f04341c794a654bd1_JaffaCakes118.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
5838811fd00d3c4f04341c794a654bd1_JaffaCakes118.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
5838811fd00d3c4f04341c794a654bd1_JaffaCakes118.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
5838811fd00d3c4f04341c794a654bd1_JaffaCakes118
-
Size
602KB
-
MD5
5838811fd00d3c4f04341c794a654bd1
-
SHA1
450cbc9ef3c96971e62f7ca0dc6bb9e6b37bbf44
-
SHA256
fdef0a60fdba36cece653755ef1dee044225cde6c988fc6b0a4efceba7c87114
-
SHA512
1e6739c498c81aa51510e4fd4367f6d8dda3befb65e9b8cb5068e1b0b738d7007f8dd42082f01d2369bb3a565d7508ccadc0348c3ac2479d08171fbc537823db
-
SSDEEP
12288:mEaFZvkGGNUuWW1NVwCKn6GAx1d9H1BY+0aTBpqSol2KpELpX79A:mEaFmFN9v46flH72wOSoMKU9A
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the mobile country code (MCC)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Checks if the internet connection is available
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1Suppress Application Icon
1Virtualization/Sandbox Evasion
2System Checks
2